Every team will receive an identical set of Unix and Windows systems per competitor (six each) from which they will be able to access the "in-character" environment of the competition.  This will result in twelve total systems for each team from which they perform their penetration test. The Unix system will be Kali Linux, if possible given the hosting environment, or a similar Unix system such as Ubuntu or Debian, with tools pre-installed. Windows hosts will be a Windows 2016 installation with minimally installed tools.